browserforce

Fail

Audited by Snyk on Feb 23, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). This skill explicitly grants arbitrary Playwright/JavaScript execution inside the user's real, already-logged-in Chrome (via an extension + relay), with access to DOM, cookies, extensions and the ability to navigate/click/fill — a capability that can readily be abused to exfiltrate credentials, session tokens, page data, or perform actions on the user's behalf, and the relay/extension model creates a remote-access vector even though no explicit exfiltration code is present in the docs.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly lets the agent open arbitrary web pages via browserforce (e.g., the "Navigate and read a page" example using browserforce -e with page.goto(...) and snapshot()/evaluate()), meaning the agent will ingest untrusted public web content from arbitrary URLs that can influence subsequent actions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 23, 2026, 09:14 AM